Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

Protecting Your System from Security Threats - Linux Security Mechanisms

Linux Foundation via YouTube

Overview

Explore a comprehensive conference talk on securing Linux-based embedded systems against various cyber threats. Learn about essential security mechanisms like DM-Crypt, DM-Verity, Secure Boot, TEE sub-system, FScrypt, and IMA. Discover practical strategies for integrating these mechanisms into diverse embedded systems, including mobile phones, tablets, network-attached DVRs, routers, and IoT hubs, while optimizing limited hardware resources. Gain insights from Gilad Ben-Yossef, a principal software engineer at Arm, as he delves into topics such as trust, fail-safe systems, chain of trust, full disk encryption, Trust Zone, and the Integrity Measurement Architecture. Enhance your understanding of building resilient Linux-based systems to protect against nefarious attacks in the ever-evolving landscape of cybersecurity.

Syllabus

Introduction
Who am I
Storytime
What happened
The problem definition
What does trust mean
What does it mean to fail safely
How do you build your system
Secure Boot
Chain of Trust
Change of Trust
DM Verity
Miracle Tree
Verity
Full Disk Encryption
System Setup
Encryption
Encryption Example
Trust Zone
Keyblob
Hubble Model
Advanced System Setup
Integrity Measurement Architecture
EVM

Taught by

Linux Foundation

Reviews

Start your review of Protecting Your System from Security Threats - Linux Security Mechanisms

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.